Miggo Logo

CVE-2020-13633: Fork CMS Cross-site Scripting Vulnerability

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.47285%
Published
5/24/2022
Updated
7/17/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
forkcms/forkcmscomposer< 5.8.35.8.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing output encoding in multiple locations handling 'navigation_title' and 'title' fields. The patch adds htmlspecialchars() in backend Model.php methods and replaces dangerous |raw filters with |escape in Twig templates. These specific functions were directly processing user-controlled input and outputting it to HTML contexts without proper neutralization, creating XSS vectors. High confidence comes from the direct correlation between patched locations and the vulnerability description.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ork ***or* *.*.* *llows XSS vi* n*vi**tion_titl* or titl*.

Reasoning

T** vuln*r**ility st*mm** *rom missin* output *n*o*in* in multipl* lo**tions **n*lin* 'n*vi**tion_titl*' *n* 'titl*' *i*l*s. T** p*t** ***s `*tmlsp**i*l***rs()` in ***k*n* `Mo**l.p*p` m*t*o*s *n* r*pl***s **n**rous |r*w *ilt*rs wit* |*s**p* in Twi* t